Search alternatives:
difference » differences (Expand Search), different (Expand Search)
algorithms » algorithm (Expand Search)
difference » differences (Expand Search), different (Expand Search)
algorithms » algorithm (Expand Search)
-
81
Optimization of PV Cleaning Practices: Comparison Between Performance-Based and Periodic-Based Approaches
Published 2020“…It is important to choose the right cleaning strategy (method and frequency) to maximize the electricity production and economic performance of the PV facility. An optimization algorithm was developed and tested for multiple PV panel configurations based in Dubai Water and Electricity Authority’s (DEWA) outdoor test facil ity (OTF) solar lab. …”
Get full text
Get full text
-
82
Optimisation of PV Cleaning Practices: Comparison Between Performance Based and Periodic Based Approaches
Published 2018“…The PV output, soiling rates, electricity price, and cleaning costs were inputted into the algorithm and 5 different approaches were simulated: 1. …”
Get full text
-
83
Evaluation of Aerosol Optical Depth and Aerosol Models from VIIRS Retrieval Algorithms over North China Plain
Published 2017“…The VIIRS Environmental Data Record data (VIIRS_EDR) is produced operationally by NOAA, and is based on the MODIS atmospheric correction algorithm. …”
-
84
A High‐Performance MPPT Solution for Solar DC Microgrids: Leveraging the Hippopotamus Algorithm for Greater Efficiency and Stability
Published 2025“…Performance of HA's is compared with three established optimization algorithms: Grey Wolf Optimization, Cuckoo Search Algorithm and Particle‐Swarm Optimization across different operating scenarios and partial shading circumstances. …”
-
85
A Prioritized Uplink Call Admission Control Algorithm for 3G WCDMA Cellular Systems with Multi-Services
Published 2005“…In addition, queuing is also used to enhance the handoff success probability. The algorithm uses the effective load as an admission criterion and applies different thresholds for new and handoff calls. …”
Get full text
Get full text
article -
86
A localized navigation algorithm for radiation evasion for nuclear facilities: Optimizing the "Radiation Evasion" criterion: Part I
Published 2013“…When used to navigate based on local radiation information, the algorithm will behave more reliably when accidents happen, since no long-haul communication links are required for information exchange. …”
Get full text
article -
87
A Survey of Audio Enhancement Algorithms for Music, Speech, Bioacoustics, Biomedical, Industrial, and Environmental Sounds by Image U-Net
Published 2023“…We will discuss the need for AE, U-Net comparison to other DNNs, the benefits of converting the audio to 2D, input representations that are useful for different AE applications, the architecture of vanilla U-Net and the pre-trained models, variations in vanilla architecture incorporated in different E models, and the state-of-the-art AE algorithms based on U-Net in various applications. …”
-
88
Map-based mobile positioning system
Published 2002“…In this paper, a mobile positioning system (MPS) is proposed based on a map-matching algorithm. Using the triangulation or a trilateration technique, the Cell of Origin, Time of Arrival, and Time Difference of Arrival, the mobile is first located within a specified area of about 500x500 squared meters in a GSM network and within a specified area of about 244x244 squared meters in an IS-95 network. …”
Get full text
Get full text
Get full text
article -
89
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure
Published 2024“…<p>In this paper, we provide a novel failure-resilient token-based mutual exclusion (ME) algorithm for distributed systems. …”
-
90
-
91
-
92
-
93
Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence
Published 2020“…The thesis has examined different algorithms that can be used for prediction such as Moving Average, Auto ARIMA, kNN, Linear Regression and Long Short Term Memory (LSTM). …”
Get full text
-
94
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
Published 2021“…Additionally, by introducing the authentication mechanism based on transfer learning, blockchains can enhance the preservation and security standards for industrial applications. …”
-
95
-
96
BIT-SLICE MICROPROCESSOR-BASED COMMUNICATIONS DECODER
Published 2020“…The design is versatile: different decoding algorithms can be executed by changing the microprogram. …”
Get full text
article -
97
Bootstrap-based Aggregations and their Stability in Feature Selection
Published 2022Get full text
doctoralThesis -
98
Upgraded SemIndex Prototype Supporting Intelligent Database Keyword Queries through Disambiguation, Query as You Type, and Parallel Search Algorithms
Published 2018“…Preliminary experiments highlight SemIndex querying effectiveness and efficiency, considering different querying algorithms, different semantic coverages, and a varying number of query keywords.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
99
Loop based scheduling for high level synthesis
Published 1995“…This paper describes a new loop based scheduling algorithm. The algorithm aims at reducing the runtime processing complexity of path based scheduling techniques. …”
Get full text
Get full text
article -
100
Regression testing web services-based applications
Published 2006Get full text
Get full text
Get full text
Get full text
conferenceObject